Short Name |
APP:MISC:LCDPROC-TEST-FUNC-FS |
---|---|
Severity |
Major |
Recommended |
No |
Category |
APP |
Keywords |
LCDproc LCDd test_func Format String Vulnerability |
Release Date |
2013/02/27 |
Update Number |
2237 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against LCDproc. A successful attack can lead to arbitrary code execution.
LCDproc Server (LCDd) has been reported to be prone to multiple remote vulnerabilities. The first issue is reported to exist in the parse_all_client_messages() function of parse.c, and is due to a lack of sufficient boundary checks performed on user-supplied arguments. A remote attacker may exploit this vulnerability to execute arbitrary instructions in the context of the vulnerable service. The second issue exists in the test_func_func() function of client_functions.c. Due to a lack of sufficient boundary checks an attacker may pass data to the function in a manner that is sufficient to trigger a buffer overflow. An attacker may leverage this condition to execute code in the context of the affected service. Finally due the an erroneous implementation of a formatted print function contained in the test_func_func() function of client_functions.c.A remote attacker may supply format specifier characters. An attacker may leverage this condition to execute code in the context of the affected service.